Text
Security in computing
Contents:
Chapter 1. Is There a Security Problem in Computing?
1.1. What Does Secure Mean?
1.2. Attacks
1.3. The Meaning of Computer Security
1.4. Computer Criminals
1.5. Methods of Defense
1.6. What's Next
1.7. Summary
1.8. Terms and Concepts
1.9. Where the Field is Headed
1.10. To Learn More
1.11. Exercise
Chapter 2. Elementary Cryptography
2.1. Termonilogy and Background
2.2. Substitution Characters
2.3. Transpotitions (Permutation)
2.4. Making Good Encryption Algorithm
2.5. The Data Encryption Standard
2.6. The AES Encryption Algorithm
2.7. Public Key Encryption
2.8. The Uses of Cryptography
2.9. Summary of Encryption
2.10. Terms and Concepts
2.11. Where The Field is Headed
2.12. To Learn More
2.13. Exercises
Chapter 3. Program Security
3.1. Secure Programs
3.2. Nonmalicious Program Errors
3.3. Viruses and Other Malicious Code
3.4. Targeted Malicious Code
3.5. Controls Against Program Threats
3.6. Summary of Program Threats and Controls
3.7. Terms and Concepts
3.8. Where The Field is Headed
3.9. To Learn More
3.10. Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1. Protected Objects and Methods of Protection
4.2. Memory and Address Protection
4.3. Control of Access to General Objects
4.4. File Protection Mechanisms
4.5. User Authentication
4.6. Summary of Security of Users
4.7. Terms and Concepts
4.8. Where the Field is Headed
4.9. To Learn More
4.10. Exercises
Chapter 5. Designing Trusted Operating Systems
5.1. What is a Trusted System?
5.2. Security Policies
5.3. Models of Security
5.4. Trusted Operating System Design
5.5. Assurance in Trusted Operating System
5.6. Summary of Security in Operating System
5.7. Terms and Concepts
5.8. Where the Field is Headed
5.9. To Learn More
5.10. Exercises
Chapter 6. Database and Data Mining Security
6.1. Introduction to Databases
6.2. Security Requirement
6.3. Reliability and Integrity
6.4. Sensitive Data
6.5. Inference
6.6. Multilevel Databases
6.7. Proposals for Multilevel Security
6.8. Data Mining
6.9. Summary of Database Security
6.10. Terms and Concepts
6.11. Where the Field is Headed
6.12. To Learn More
6.13. Exercises
Chapter 7. Security in Networks
7.1. Network Concepts
7.2. Threats in Networks
7.3. Network Security Controls
7.4. Firewalls
7.5. Intrution Detection Systems
7.6. Secure E-mail
7.7. Summary of Network Security
7.8. Term and Concepts
7.9. Where the Field is Headed
7.10. To Learn More
7.11. Exercises
Chapter 8. Administering Security
8.1. Security Planning
8.2. Risk Analysis
8.3. Organizational Security Policies
8.4. Physical Security
8.5. Summary
8.6. Terms and Concepts
8.7. To Learn More
8.8. Exercises
Chapter 9. The Economics of Cybersecurity
9.1. Making a Business Case
9.2. Quantifying Security
9.3. Modelling Cybersecurity
9.4. Current Research and Future Directions
9.5. Summary
9.6. Terms and Concepts
9.7. To Learn More
9.8. Exercises
Chapter 10. Privacy and Computing
10.1. Pricacy Concepts
10.2. Provacy Principles and Policies
10.3. Authentication and Privacy
10.4. Data Mining
10.5. Privacy on the Web
10.6. E-mail Security
10.7. Impacts on Emerging Technologies
10.8. Summary
10.9. Terms and Concepts
10.10. Where the Field is Headed
10.11. To Learn More
10.12. Exercises
Chapter 11. Legal and Ethical Issues in Computing Security
11.1. Protecting Programs and Data
11.2. Information and the Law
11.3. Rights of Employees and Employers'
11.4. Redress for Software Failures
11.5. Computer Crime
11.6. Ethical Issues in Computer Security
11.7. Case Studies of Ethics
11.8. Terms and Concepts
11.9. To Learn More
11.10. Exercises
Chapter 12. Cryptography Explained
12.1. Mathematics for Cryptography
12.2. Symmetric Encryption
12.3. Public Key Encryption Systems
12.4. Quantum Cryptography
12.5. Summary of Encryption
12.6. Terms and Concepts
12.7. Where the Field is Headed
12.8. To Learn More
12.9. Exercises
No other version available